Sandcat Browser version 2.0 includes several user interface and experience improvements, an improved extension system, RudraScript support and new extensions.

What is Sandcat Browser?

The fastest web browser combined with the fastest scripting language packed with features for pen-testers. Sandcat Browser is a freeware portable pen-test oriented multi-tabbed web browser with extensions support developed by the Syhunt team, the same creators of the Sandcat web application security scanner. The Sandcat Browser is built on top of Chromium, the same engine that powers the Google Chrome browser, and uses the Lua language to provide extensions and scripting support.

This first Sandcat Browser release includes the following pen-test oriented features:

Live HTTP Headers

Request Editor extension

Fuzzer extension with multiple modes and support for filters

JavaScript Executor extension -- allows you to load and run external JavaScript files

Lua Executor extension -- allows you to load and run external Lua scripts

Syhunt Gelo

HTTP Brute Force, CGI Scanner scripts and more.

User Interface & Experience Enhancements

New windows will now open in new Tabs.

Navigation bar now behaves like Firefox's or Opera's.

Improved multi-tab support.

Improved source tab.

Added a simple cookie logging extension.

Sandcat Browser Extension Development Kit

The Sandcat Browser Extension Development Kit is now available here. It also includes the source of all the Sandcat Browser extensions.

Added RudraScript

Syhunt RudraScript allows you to easily execute code in JavaScript, PascalScript, Perl, PHP, Python, Ruby & VBScript from within the browser and the browser extensions. Details about the RudraScript support can be found at this link

PricewaterhouseCoopers has revealed in a report that cyber criminals are now shifting their attacks towards emerging markets, especially those engaging with carbon emission trades which promote low carbon technologies but whose security measures have not yet grown to combat online attacks.

In Brazil, 8% of the companies under attack of Cyber Criminals and had losses above $ 1 billion of Brazilian companies. A recent survey by PricewaterhouseCoopers (PwC) finding that over one third of Brazilian companies (32%) was the victim of cybercrime last year. The world average is lower, 23% of companies have been targets of cyber attacks in 2011.

More than half of Brazilian executives (51%) explained that one of the biggest problems related to awareness and combat electronic crime is the fact that management of their companies adopted only informally or on an ad hoc solutions and security processes.

Cyber criminals are targeting these emerging markets to exploit the vulnerabilities of their systems and extract information which they could use for illegal profit. For example, Greece and Austria have recently suffered from security breaches. In 2010, unsuspecting employees from German companies have received bogus emails allegedly sent by phishers through seemingly legitimate but bogus registries.

"Today the biggest challenge for those working in information security, especially corporate, are the attacks that target specific business environments", Moreno Garcia believes, commercial director and regional manager of Symantec in Brazil. The defense against this type of attack requires the use of remote management services, as the company's IT administrator can not monitor all security incidents at the same time.

Last year,a Finnish software developer, was cruising Google’s Android Market for smartphone apps last year when he noticed something strange. Dozens of best-selling applications suddenly listed the same wrong publisher. Google uses a little known kill switch, to forcibly removing the malicious code from more than 250,000 infected Android smartphones. It’s a powerful way to stop threats that spread quickly, but it’s also a privacy and security land mine.

With the rollout of the Windows 8 operating system expected later this year, millions of desktop and laptop PCs will get kill switches for the first time. Microsoft has confirmed that they have remote kill switch installed in to Windows 8 apps. using this access, they can disable and even remove an app entirely from a user’s device. This piece of information was released along with other details of the upcoming Windows Store for Windows 8.

Anyone worried about Microsoft having complete access to your computer can rest easy for now. The company has stated that they can only “kill” programs downloaded from its new Microsoft App Store. This is what the company has to say about it in official terms: -“In cases where your security is at risk, or where we’re required to do so for legal reasons, you may not be able to run apps or access content that you previously acquired or purchased a license for,”.

Any software loaded from a flash drive, DVD, or directly from the Web will remain outside Microsoft’s control. Still, the kill switch is a tool that could help Microsoft prevent mass malware infections. “For most users, the ability to remotely remove apps is a good thing,” says Charlie Miller, a researcher with the security company Accuvant.

Hiroshi Lockheimer, Google’s vice president of Android engineering, says the search company reserves the use of the kill switch for “really egregious, really obvious cases” of harmful content. Microsoft’s Biggs says the company has used the functionality in its smartphones only for “technical issues and content issues.” Apple declined to comment. Amazon did not respond to several messages.

Nonetheless, a “kill switch” for curators of online applications marketplace is common as companies try to protect users of the platforms they develop from malware or hacking attempts implemented through applications.Microsoft’s upcoming Windows 8 operating system is expected to be launched by the middle of next year.

Interpol’s Web site (www.interpol.int) went down Tuesday just hours after the international police agency announced the arrest of 25 suspected members of the hacking collective Anonymous in Argentina, Chile, Colombia and Spain.

The authorities in Argentina, Chile, Colombia and Spain carried out the arrests and seized 250 items of IT equipment and mobile phones, Interpol says.Those arrested are aged between 17 and 40.

A National Police statement said two servers used by the group in Bulgaria and the Czech Republic had been blocked.It said the four included the alleged manager of Anonymous' computer operations in Spain and Latin America, who was identified only by his initials and the aliases "Thunder" and "Pacotron".

Authorities in Europe, North America and elsewhere have made dozens of arrests, and Anonymous has increasingly attacked law enforcement, military and intelligence-linked targets in retaliation. Earlier this month the group knocked the C.I.A. Web site offline. A week earlier, the group intercepted a conference call between the Federal Bureau of Investigation and Scotland Yard and released a 16-minute recording of the call.

Spanish police traced back IP addresses from server logs, leading to 10 suspects in Argentina, six in Chile and five in Colombia, responsible for defacement of websites and publishing confidential data, including the personal data of the security detail of unnamed top officials, according to Agence France Presse.

The group had set up a chat-room to help run computer attacks in Spain and Latin America.After the arrests, a call went out in chat-rooms affiliated with the suspects for supporters to attack the Spanish police website. The petition specifically asked for people from outside of Spain to carry out the attacks "so that the police would not have enough data to lead to new arrests", according to the statement.

Anonymous has become increasing politicised over the last year, particularly over issues of online rights and the international controversy over whistleblowing website WikiLeaks.

Google has offered prizes, totalling $1 million, to those who successfully hack the Google Chrome browser at the Pwn2Own hacker contest taking place next week i.e 7 March 2012. Chrome is the only browser in the contest's six year history to not be exploited like at all.

Therefore Google will hand out prizes of $60,000, $40,000, and $20,000 for contestants able to remotely commandeer a fully-patched browser running on Windows 7. Finding a "Full Chrome Exploit," obtaining user account persistence using only bugs in the browser itself will net the $60k prize. Using webkits, flash, or a driver-based exploit can only earn the lesser amounts.

Prizes will be awarded on a first-come-first-serve basis, until the entire $1 million has been claimed. “While we’re proud of Chrome’s leading track record in past competitions, the fact is that not receiving exploits means that it’s harder to learn and improve,” said Chris Evans and Justin Schuh, members of the Google Chrome security team.

“To maximize our chances of receiving exploits this year, we’ve upped the ante. We will directly sponsor up to $1 million worth of rewards.” Pwn2Own isn’t the only time researchers can be paid for digging up security flaws in Chrome. Like other companies including Mozilla and Facebook, Google offers “bug bounties” to researchers, and its flaw-buying program has given out more than $300,000 in payments over the last two years.

Secunia Personal Software Inspector (PSI) is a free program that scans the system for programs that are installed in an outdated version.The developers have just released the first beta version of Secunia PSI 3.0 for Windows. A new version of the Personal Software Inspector (PSI) tool from vulnerability management firm Secunia automates the updating of third-party programs that don’t already have auto-updaters built-in.

When you start the program for the first time after installation, you are asked to run a scan on the system. Secunia compares the list of installed software with the latest versions stored in their database. A list of outdated programs are then displayed in the program interface.

Though most software vendors release patches, its tedious for users to find these updates and download them, where Secunia inspector tool identifies vulnerable programs and plug-ins in your Computer, download and installs all the required patches to keep your Computer safe so that you can safely bank, shop and socialize online.

Secunia PSI 3.0 is compatible with all recent 32.bit and 64-bit editions of the Microsoft Windows operating system.

Adrian Crenshaw aka Irongeek just release another great tool for web admins that will monitor the files on a website, and report any changed via email. Actually "irongeek.com" was hacked few days back which is hosted on a shared hosting. There is an awesome article posted by him on his blog "How I Got Pwned: Lessons in Ghetto Incident Response". I think after that Adrian decide to make a handy tool/script to help web admins so that they can easily monitoring there files on a shared server.

This simple shell Script user can run on a shared server. Let suppose once hackers get into your website either by exploiting known vulnerabilities in any of the installed programs OR by getting FTP access to your server, the first thing they usually do is to plant backdoor scripts to log them in again at a later date. They need some executable script on the server to gain access to MySQL passwords, installation passwords or even edit settings in your wordpress or other installations. We have also seen situations where the site was left largely unchanged except for malicious javascript code added to the bottom of the index.php or index.html files.

The problem is that we dont even have an idea that our site is hacked until it is too late or too embrassing. Irongeek write a script , that will run on the server and will detects any changes or to any executable file on the server or any new file on the server from HTML, JS, to PHP, ASP, Perl, Python files etc. It will generate a hash value of all our files and then compare them periodically, then we will be able to detect when our codebase has changed on the server.

A cron job can be setup to run the web server, compare the results with the last known valid hash and send out an email alert. Another similar tool was released by Dave Kennedy named "Artillery" for confusing hackers and protection tool for Linux.

Many Chinese have taken up a call to “Occupy Obama’s Google+” over the weekend in the style of Occupy Wall Street in order to feel “close” to the popular world leader as well as air some of their views.

Hundreds of Chinese have flooded US President Barack Obama's Google+ page, apparently taking advantage of a glitch in China's censorship system to post about human rights and green cards. At first glance, it looks like the official Google+ page is being spammed, but taking a look at some of the comments left in English, you’ll realise that it’s Chinese citizens who have taken to the social network to decry their government’s appalling human rights track record.

Some netizens urged Obama to help free activists such as blind lawyer Chen Guangcheng, who is currently under house arrest, or Liu Xiaobo, the jailed Nobel Peace Prize winner. Some comments left by the Chinese called for free speech and human rights. Others asked for information on getting U.S. "green cards" for immigration. Some more extreme comments urged President Obama to work “to free” the Chinese people. The White House in Washington has not commented on the upsurge of Chinese interest in President Obama's campaign site.

Huawei has introduced what it calls the world's fastest quad-core smartphone, the Huawei Ascend D quad. Powered by Huawei's K3V2 quad-core 1.2GHz/1.5GHz processor the beast comes with Android 4.0. In an aggressive presentation at the Mobile World Congress Show in Barcelona, Huawei repeatedly compared its new product to Samsung’s Galaxy Nexus and Apple’s latest iPhone.

A spokesman for the Nobel Peace Prize jury says 231 nominations have been submitted for this year's award, with publicly disclosed candidates including WikiLeaks whistle-blower Bradley Manning may be among the hundreds of nominees for the 2012 Nobel Peace Prize, rights activists say.

Bradley Manning, a 23-year-old Army intelligence analyst, is accused of leaking a video showing the killing of civilians, including two Reuters journalists, by a US Apache helicopter crew in Iraq. He is also charged with sharing the documents known as the Afghan War Diary, the Iraq War Logs, and embarrassing US diplomatic cables, with the anti-secrecy website WikiLeaks. The video and documents have illuminated such issues as the true number and cause of civilian casualties in Iraq, human rights abuses by U.S.-funded contractors and foreign militaries, and the role that spying and bribes play in international diplomacy.

Among the people known to have been nominated for this year's prize are former US president Bill Clinton, ex-German chancellor Helmut Kohl who led his country's reunification process, and Ukraine's ex-premier and now jailed opposition leader Yulia Tymoshenko. The winner or winners will be announced in October.

THN Deals Store this week brings you the Cybersecurity Certification Mega Bundle, which will walk you through the skills and concepts you need to master three elite cybersecurity certification exams: CISA, CISM, and CISSP [...]

Good news, we bring an amazing deal of this month for our readers, where you can get hacking courses for as little as you want to pay and if you beat the average price you will receive the fully upgraded hacking bundle!

WikiLeaks today began publishing more than five million confidential e-mails from US-based Intelligence firm Stratfor. About 5.5m emails obtained from the servers of Stratfor, a US-based intelligence gathering firm with about 300,000 subscribers and has been likened to a shadow CIA.

The emails, snatched by hackers, could unmask sensitive sources and throw light on the murky world of intelligence-gathering by the company known as Stratfor, which counts Fortune 500 companies among its subscribers. Stratfor in a statement shortly after midnight said the release of its stolen emails was an attempt to silence and intimidate it.

The Online organisation claims to have proof of the firm's confidential links to large corporations, such as Bhopal's Dow Chemical Co and Lockheed Martin and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. WikiLeaks did not say how it had acquired access to the vast haul of internal and external correspondence of the Austin, Texas company, formally known as Strategic Forecasting Inc.

Stratfor, somewhat akin to a privatized CIA, sells its analyses of global politics to major corporations and government agencies.Members of Anonymous with direct knowledge of the hack and transfer of data to WikiLeaks told that the group decided to turn the information over to WikiLeaks because the site was more capable of analyzing and spreading the leaked information than Anonymous would be.

People linked to Anonymous took credit for the data theft.'Congrats on the amazing partnership between £Anonymous and £WikiLeaks to make all 5 million mails public,' AnonSec Tweeted. Hackers linked to the loosely organized Anonymous hackers group said at the beginning of the year they had stolen the email correspondence of some 100 of the firm's employees. WikiLeaks and Anonymous maintain the emails will expose dark secrets about the company.

WikiLeaks founder Julian Assange said, 'Here we have a private intelligence firm, relying on informants from the U.S. government, foreign intelligence agencies with questionable reputations and journalists.'

The first batch of released emails contains only 167, and the rest some 5 million are to be gradually released in the coming weeks, as WikiLeaks media partners report on what they found in them.The source of the leaked emails is Anonymous, who got their hands on it when they breached Stratfor's systems in December.

The group claims to have found evidence that Stratfor gave a complimentary membership to Pakistan General Hamid Gul, former head of Pakistan's ISI Intelligence service, who, according to US diplomatic cables, planned an IED attack against international forces in Afghanistan in 2006.

Bradley Manning, the man suspected of turning over a massive cache of classified US documents to the secret-spilling site, on Thursday declined to enter a plea at his arraignment. Manning, a 24-year-old US army private, is charged with 22 counts in connection with one of the biggest Intelligence breaches in US history. WikiLeaks was due to hold a Press conference at London's Frontline Club later today.

After Stratfor's computers were hacked at least twice last December, the credit card details of more than 30,000 subscribers to Stratfor publications were posted on the Internet. The hacking attack on Stratfor is subject to an FBI investigation. Several alleged members of Anonymous have been arrested by authorities in the US and UK as part of investigations.Stratfor had not at the time of writing commented on the authenticity of the published material.

Internet censorship in Pakistan, National Filtering and Blocking System

A Pakistan government department has called for proposals for the development, deployment and operation of a national level URL Filtering and Blocking System. The proposal request states that each box of the system “should be able to handle a block list of up to 50 million URLs with a processing delay of not more than 1 millisecond.”

According to a request for proposals from the National ICT (Information and Communications and Technologies) R&D Fund, the Pakistani government is struggling to keep a lid on growing Internet and Web use and is looking for a way to filter out undesirable Web sites. The 'indigenous' filtering system would be 'deployed at IP backbones in major cities, i.e., Karachi, Lahore and Islamabad,' the RFP.

According to a post on EEF, Ever since the Pakistan Telecommunication Act, passed in 1996, enacted a prohibition on people from transmitting messages that are “false‚ fabricated‚ indecent or obscene,” the PTA has increasingly intensified their efforts to censor content online. The PTA blocked thousands of sites in 2007 not just those containing pornographic material or content offensive to Islam, but numerous vital websites and services in response to a Supreme Court ruling that ordered the blocking of “blasphemous” websites.

In 2008, they briefly blocked YouTube because the site hosted Geert Wilder’s film “Fitna.” They blocked it again in 2010, over a hosted clip of Pakistani President Asir Zardari telling an unruly audience member to “shut up.” In May of 2010, the PTA blocked Facebook in response to a controversy over a competition to draw the Prophet Mohammed.

The filtering and blocking of Web sites and Internet addresses that are deemed hostile to authorities has become a major political and human rights issue in the last year, as popular protests in Egypt, Tunisia, Libya and Syria, dubbed "The Arab Spring" erupted. Notably, the Egyptian government used Web filtering tools to block access to Facebook in the midst of that country's popular overthrow of the government of Hosni Mubarak in January, 2011.

The proposal states that the solution should be able to handle 85Gbps of bandwidth and should have growth scalability of around 40% to 50% every year.The government has recently cracked down on content that is deemed offensive, blocking up to over 13,000 pornographic websites and was also considering certain words in SMSs.

CabinCrew group of Hackers, that claims to have found, and reported, objectionable photos of children in an officer's private e-mail account, anonymously posted hacked police data to a website. More than 100 local law enforcement officers had their private information pilfered and published on a public website prompting a response from the FBI

"Over the past three weeks, we in the cabin have been targeting law enforcement sites across the United States, be it for injustices they have allowed through ignorance or naivety, taken part in, or to point out the fact that their insecurity failed to protect the safety of those they took an oath to serve," the hacker statement on the Pastebin site said.

The hackers posted officers' property records, campaign contributions, biographical information and, in a few cases, the names of family members, including children. Authorities said the current intrusion is different because the information gleaned from the association's website was not available to the public.

Even though Google recently introduced a malware-blocking system called Bouncer to keep the Android Market safe from malicious software, crafty spammers and fraudsters are still managing to find ways around the restrictions to get their software onto users’ phones.

Security firm, Sophos have reported that there is malware going around via the Facebook application. The malicious software disguises itself as an Android app named “any_name.apk” or “allnew.apk” and is sent to Android phones via Facebook’s mobile app.

An Android user may receive a Facebook friend request and if the user goes to the requester’s profile to check them out, they could be diverted to another web page instead, where the malicious app will be automatically downloaded.

Although Android doesn’t by default allow apps to be automatically downloaded, some users choose to turn off this protection in order to have access to apps distributed outside of the Android Market. This kind of malware is similar to clickjacking, which takes place very often on Facebook.

Bouncer is a good first step towards protecting Android users, but regardless of what methods are used to lock down the Android Market, spammers and scammers can always find another way in.

3 weeks before we reported that Symantec releases patch to address pcAnywhere source code exposure, because attackers had obtained the remote access software's source code. But According to H.D. Moore, chief security officer at Rapid7, estimated 150,000 to 200,000 PCs are running an as-yet-unpatched copy of the Symantec software.

While Symantec said it had patched all the known vulnerabilities in pcAnywhere. Symantec has released new information and a patch to address the recent code exposure incident. According to Computerworld report, PCs connected to the Internet, including as many as 5,000 running point-of-sale programs that collect consumer credit card data, could be hijacked by hackers exploiting bugs in the troubled program.

Symantec released a patch that eliminates known vulnerabilities affecting pcAnywhere 12.0 and pcAnywhere 12.1.At this time, Symantec recommends that all customers upgrade to pcAnywhere 12.5, apply all relevant patches as they are released, and follow general security best practices.

Moore said, even though Symantec has patched some flaws. With the source code at their disposal and the software's problems highlighted in the media, researchers on both sides of the law will spend time looking for vulnerabilities.

Smartphones are increasingly becoming the preferred device for both personal and professional computing, which has also attracted hackers to increase their focus on creating malware and other security vulnerabilities for these devices. A former McAfee researcher "Dmitri Alperovitch" has used a previously unknown hole in smartphone browsers to plant China-based malware that can record calls, pinpoint locations and access user texts and emails.

He conducted the experiment on a phone running Android operating system, although he saysApple Inc.'s iPhones are equally vulnerable. Android is particularly vulnerable because it has become the main operating system for mobile devices. Today most smartphones are android-based therefore there is a huge dividend for hackers to write Android-targeted malware compared to other operating systems.

Alperovitch, who has consulted with the U.S. intelligence community, is scheduled to demonstrate his findings Feb. 29 at the RSA conference in San Francisco, an annual cyber security gathering. Alperovitch and his team reversed engineered the malware called Nickispy and and took control of it.

A nice little piece of Android spyware, commonly known as 'NickiSpy.C' . For those unfamiliar, NickiSpy gained quite a bit of notoriety around July/August 2011, as it was one of the first malicious Android applications to have the ability to record phone calls. Alperovitch said he exploited a so-called zero-day vulnerability in smartphone browsers to secretly install the malware. Zero-day vulnerabilities are ones that are not yet known by the manufacturers and anti-virus companies.

The malware also intercepts texts and emails and tracks the phone's location, he said. In theory, it could be used to infiltrate a corporate network with which the phone connects. Like most pieces of Android spyware/malware, installation is dependant on the end-user. In an experiment he also delivered it through a classic "spear phishing" attack.

Protect from Malware : For Android, the danger is downloading apps outside of Google's App Market . If you're off somewhere getting apps from sources you don't know or trust, there could be consequences. For iPhone users, the line really is whether you jailbreak or not. Jailbreaking can be pretty easy, and getting pirated or bootlegged apps can seem like a great way to save money, but in doing so, you're basically handing out the smart phone equivalent of a front door key to Lord only knows.

As Anonymous has promised that it will attack government, corporate and law enforcement web sites every Friday, So Anonymous has attacked the FBI affiliate Infragard for the second time, this time taking over and defacing the web site of its Dayton, Ohio chapter.

Hackers give message "Greetings Pirates! Another #FuckFBIFriday is here and once again we emerge from the hacker underground to wreak havoc upon the 1%'s institutions of repression" .

InfraGard is a private non-profit organization serving as a public-private partnership between the U.S. businesses and the FBI. However, Anonymous has its own definition - "the sinister alliance between law enforcement, corporations, and white hat wannabees," the group wrote in a note it posted onto the homepage of InfraGard Dayton, Ohio.

Anonymous attacks Official Site of the National Police (http://policia.es/) after the arrests of suspected Anonymous hacktivists. The Spanish branch of the group has reported that six hacktivists have been arrested in Spain over the past few days. The police did not confirm the identity of the suspects, but claimed the force's technological investigation brigade is conducting a large operation.

Last week, Following the arrest of three young Anonymous hackers in Greece, the collective carried out a second assault on the ministry of justice's website, defacing its homepage. Last June Anonymous launched #OpPolicia, a successful DDoS attack against the Spanish National Police website. The attack was a direct response to the arrests of three individuals alleged to be associated with acts of cyber civil disobedience attributed to Anonymous.

Since last release in October, Metasploit added 54 new exploits, 66 new auxiliary modules, 43 new post-exploitation modules, and 18 new payloads.

Metasploit 4.2 now ships with thirteen brand new payloads, all added to support opening command sessions and shells on IPv6 networks. In addition, Metasploit’s existing arsenal of payloads has been updated to support IPv6 as well. With this release comes a pile of new modules targeting VMware vSphere/ESX SOAP interface, as well as a pair of new brute force modules to audit password strength for both vmauthd and Virtual Web Services.

Metasploit 4.2 now ships with fourteen new resource scripts, nearly all of which were provided by open source community contributors. These scripts demonstrate the power of Metasploit’s extensible architecture, allowing programmatic Metasploit module usage through the powerful Ruby scripting language.

The PacketFence development team has published version 3.2.0 of its open source network access control (NAC) system. PacketFence allows organisations to increase control over their network by enforcing authentication and registration for newly connected devices. It also enables abnormal network activity detection and the isolation of troublesome devices.

Billing engine integration for allowing the use of a payment gateway to gain network access.

PacketFence 3.2.0 fix Reflected Cross-site scripting (XSS) in Web Admin printing system. Further information about the update, including a full list of changes, can be found in the official release announcement and in the change log.

The employment minister claims his email has been hacked by campaigners against a Government work experience scheme, which is continuing to attract controversy.

Chris Grayling accused a group of socialist activists of pressuring firms to quit the scheme amid accusations that it was "slave labour" because youngsters worked for nothing, while keeping their benefits.

But his claim that his email was hacked as part of the campaign clearly sent alarm bells ringing across Whitehall, and a retraction was hastily issued. He also claimed that firms reportedly pulling out of the programme, including supermarket giant Sainsbury's, had never formally been involved in the Government initiative because they ran their own scheme.

According to a blog post on 1337 Blog, the XSS flaw discovered on these sites could allow an attacker to hijack cookies if he manages to convince the potential victim to click on a specially designed link. If exploited successfully, a hacker could hijack the user’s session and even steal his/her account.

Skype has been informed of the vulnerabilities and is currently investigating. Other XSS discovered by him are listed here.

Too many are using illegal GPS jamming devices on UK roads, according to a study, and are putting critical emergency systems at risk of failure and it's at extreme risk from criminals, terrorist organizations and rogue states and even someone with a rudimentary GPS jammer that can be bought on the Internet for $50.

It's thought that those using GPS jammers could be doing so to block tracking systems installed on the vehicles, suggesting that they might be stolen. Initial findings using six months' worth of data from 20 probes suggests that between 50 and 450 incidents of deliberate GPS jamming take place every day across the UK.

Jammers vary wildly in effectiveness and power output. A recent study by GPSWorld of 18 commercially available receives showed an effective range that varied from 300 meters up to 6 kilometers. The danger of such devices affecting critical safety systems is obvious. In 2009 investigators discovered that problems with a navigation aid at Newark airport in the US were caused by a GPS jammer used in a truck that passed each day.

Data from Sentinel monitors have already be used to identify one driver using a GPS jammer but with increasing reliance on GPS for navigation, safety systems, financial market transactions and mobile telephone and power network operation, the project hope to develop better detection systems that can detect jammers and identify the vehicle in which is it being used.

Lebanese Yellow Pages website (http://www.yellowpages.com.lb/) database compromised by Hacking Group known as Mad HackerZ Team. Hackers manage to hack database of site and leaked it on internet.

Leaked database include the usernames, Password hashes and Email Id's of Admin and Few accounts as shown. All this data posted on a pastebin note : http://pastebin.com/dvBzWCF6

Most probability hackers uses Sql Injection Exploit to get the database . According to Softpedia report, They also gained unauthorized access to other domains which they defaced to host their protest messages. The defaced sites include the ones of a political figure called Rafic Al Hariri, an online store named Dunes, Frontpage-lb, a computer company, and the site of a football team.

As we reported Yesterday that Azerbaijan Arrests a Iranian terror group and in response Iranian Hackers hits many Azerbaijan Sites like, Azerbaijan airlines (http://azerbaijanairlines.org/) and National Olympic Committee Of Azerbaijan (http://noc-aze.org) . Today Iran Cyber Army also come into Action for supporting Iran and deface the Azerbaijan State Television & Radio Company, AzTV websites also.

A message in English from the hackers popped up in place of the AzTV website when it was opened.“Life is Game"Game OVER..!!!”, the message read and was signed "the Iranian Cyber Army".The website has already been restored.

The attacks came a month after anti-Israeli hackers broke into the sites of several ministries and the governing party, leaving messages calling the Azerbaijani authorities "servants of the Jews".

Relations between the two countries are tense at present.Iran has accused Baku of helping Israeli security agencies kill an Iranian nuclear physicist, but Baku denies the allegations.In turn, Baku says it has smashed terrorist groups in Azerbaijan which had links with Tehran and were planning to assassinate foreigners.Notes of protest have been exchanged.

Cybercriminals are using a modified version of the Zeusbot/Spyeye, which is using a peer-to-peer (P2P) network architecture, rather than a simple bot to command-and-control (C&C) server system, making the botnet much harder to take down, Symantec warned. ZeuS is very popular in the cybercriminal world because it's capable of stealing a wide variety of information, documents and login credentials from infected systems.

For many years it was the weapon of choice for most fraudsters targeting online banking systems.The Trojan's source code was published on Internet underground forums last year, paving the way for many third-party modifications and improvements.

Previously, P2P was used to communicate between bots any change in the C&C server's URL. Other techniques have also been used, such as programmatically determining the URLs to be used on particular dates in the event that a bot loses contact completely.

However, a new variant recently detected by antivirus vendor Symantec has completely removed the need for C&C servers. "Every peer in the botnet can act as a C&C server, while none of them really are one," Symantec researcher Andrea Lelli said in a blog post Wednesday.

Other changes noted by Symantec include a greater use of UDP instead of TCP to make it harder to track and dump data exchanges, and alterations to the compression and encryption used. In addition, the Zeus bot has been found distributing additional malware.

"Bots are now capable of downloading commands, configuration files, and executables from other bots -- every compromised computer is capable of providing data to the other bots," she said.

"Zeustracker is a site which has had considerable success in tracking and publishing IP block lists for Zeus C&C servers around the world," Lelli said, adding that Zeus' switch to P2P for these functions means that the site would no longer be able to produce exact Zeus C&C IP block lists.

Law enforcement has been able to take down botnets in the past by shutting down the C&C servers. However, with a P2P network architecture, a botnet can avoid this single point of vulnerability.

The National Security Ministry of Azerbaijan said Tuesday that it had disrupted a suspected terrorist group working for Iran’s secret services. The people were gathering intelligence and had acquired a large number of weapons and explosives, the ministry said.

The group, led by a Sepah officer called Hamid and Hezbollah operative Hadji Abbas, was planning to stage attacks against the Israeli embassy and a Jewish cultural center in the Azeri capital Baku.

To response this,Iranian Hacking Group "Cocain TeaM" attack on the websites of Azerbaijan airlines (http://azerbaijanairlines.org/) and National Olympic Committee Of Azerbaijan (http://noc-aze.org) and manage to collect lot of info and sent that to Iranian Governments to show their patriotic responsibility towards country. Cocain TeaM deface the websites also.

Jean-Pierre aka DarkCoderSc and Fred De Vries Develop and Release the second version of Another great security tool named "Mirage Anti-Bot 2.0". Zeus and SpyEye were the two main families of botnet software. These types of malware are spread mainly through drive-by downloads and phishing schemes.

They are so-called Trojan horses which are designed to steal credentials from various online services like social networks (such as Facebook, Hi5, Yahoo, Netlog), online banking accounts (phising), ftp-accounts, email-accounts and other. They are part of botnets that are estimated to include millions of compromized computers.

Because your antivirus program is not always giving you enough protection against these types of malware, so Experts at http://unremote.org/ create this program for you, that can be used as an extra layer of security. Mirage Anti-Bot will be downloading and installing one or more blocklists from www.abuse.ch, a reputable Swiss-based anti-malware website. This effectively stops your computer from reaching infected sites, thus minimizing the risk to be infected with this extremely dangerous type of malware.

Norton's study showed the city was one of the ten worst for hacking. Each city was ranked by the prevalence of PCs and smartphones in addition to social media use with risk factors like unsecured Wi-Fi hotspots and malware attempts. Manchester was found to be the riskiest city and Vancouver is the third most vulnerable city in Canada for cyber-crime.

Cyber crime expert Simon Ellson said there are a numer of steps people can take to stay safe when they are using accessing the web via a smart phone or laptop.Mr Ellson said: "Never ask your web browser to store your username and password for a website. If you are going to create a password, which you should for any device that you are using, make it unique and change it regularly.Ultimately, make sure you have got some protection on the device you are using. It is a bit like the lock on your front door, if you don't put some kind of preotection on your device, it is like not locking your front door."

Top 3 Safety Tips from Norton

1. Proceed with caution when using Wi-Fi hotspots

2. Use complex and unique passwords for each site

3. Stay educated

According to Symantec, people who are more connected online are more vulnerable to cyber-criminals. Cyber crime rates cost Canadians $5.5 billion in 2010, according to a study released by Symantec. At least 7.3 million Canadians were victims of cybercrime last year, and there are about 20,000 new victims each day.

Two days before we reported about The Syrian Malware - programs used to target the Syrian opposition. According to Report, They steal the identities of opposition activists, then impersonate them in online chats, then they gain the trust of other users, pass out Trojan horse viruses and encourage people to open them.

Telecomix agents Reverse-engineered that malware and Found that Darkcomet RAT (Remote Administration Tool) version was 3.3 was Injected in SFX (SelF-eXtracting) archives as 1122333.exe injects this binary program into the Windows process "svchost.exe".

Telecomix blame Jean-Pierre aka DarkCoderSc (Developer of Darkcomet) for creating this tool by saying "Jean-Pierre, please, next time you thing about writing some "espionnage software" think about life at stakes here and do something useful instead with your talent."

In Response Jean-Pierre write on a blog post, "i would like to say publicly that i’m very sorry about this i never thought and i never knew that they use my free software (proper word would be hijacked) for doing this.". "i code software because it is my passion i feel comfortable to doing this, i don’t do this for money even if i could sell it i don’t, i just sell for a chip price a support and thats all, i have nothing else to win."

Not even this, DarkCoderSc deciding to shut down his Project : Darkcomet, But we strongly believe and supporting DarkCoderSc to keep running this Project. This Tool was never developed for being a weapon for cyber war. The contribution of Jean-Pierre is Revolutionary in IT security. Don't let people bring you down. They can't Blame the Developers !

Trojans, Viruses, Worms have become the scare of the year, and with good reason. Many of the recent files are malicious in nature, causing the infected user at the very worst, to lose everything on their computer. There are few specially coded malware, which are not only developed to ensure that they cause maximum damage and steal all the sensitive information they can find on the infected devices.

According to Bitdefender experts, In a blog post they mention about such a malware called "Dropper" or Trojan.Dropper.UAJ. But the brand new in terms of approach that dropper hijacks a library file called comres.dll, altering it to ensure that each time it’s being used, the malware steps into play. The smartness of this malware can be judge from here that, it makes a copy of the genuine comres.dll file, patches it and then saves it in the Windows directory folder, where the operating system normally looks for a DLL to load when it is required.

This attack unites two type of exploitation. DLL Hijacking is an attack that exploits the way some Windows applications search and load Dynamic Link Libraries. A bad guy can place a fake DLL for a known program in a location that is searched before the real DLL’s location and almost guarantee that the malicious DLL is loaded, resulting in whatever code the attacker wants to run running. The Trojan then drops a Backdoor, identified by Bitdefender as Backdoor.Zxshell.B, which actually contains the code compromising the system.

Trojan.Dropper.UAJ is able to run on Windows7, Windows Vista, Windows 2003, Windows 2000 or Windows NT in both 32- and 64-bit environments.

2012 in terms of malware will be one of explosive growth, mostly because of the spread and growing allure of social networks and Security issues of the Android platform will mean that the number of threats to smartphones and tablets will also experience a boost in 2012.

Kim Dotcom, the millionaire founder of the file-sharing website Megaupload, was released on bail Wednesday after a judge said he didn't appear to have enough money to flee. Authorities in the U.S. allege founder Kim Dotcom facilitated millions of illegal downloads through his company and he is subject to online piracy charges.

Last month, U.S. authorities shut down Megaupload's websites and announced indictments against Dotcom and six other people connected to the site, accusing them of operating an "international organized criminal enterprise responsible for massive worldwide online piracy of copyrighted works." They say Megaupload generated more than $175 million in illegal profits through advertising revenue and the sale of premium memberships.

He had been in custody since his arrest on January 20 after he was initially denied bail. He said: 'I am relieved to go home to see my family, my three little kids and my pregnant wife and I hope you understand that that is all I want to say right now.'

Dotcom was born Kim Schmitz but legally changed his name. He is a citizen of both Germany and Finland and was granted New Zealand residency in 2010. He has also lived in Hong Kong, where the Megaupload company is registered. The Megaupload founder, along with three of his associates, will face a hearing for extradition starting on 20 August, which is expected to take three weeks.

The number of new malware releases slowed during the final three months of 2011, but was higher than expected for the year. Computer and mobile security firm McAfee has warned “no organisation,platform or device” is immune from malware attacks as it released its Q4 2011 Threats Report.

Mobile malware hit more than 400 unique samples in Q4, up from over 100 in the third quarter, and less than 50 samples in the first quarter of last year. McAfee also found that PC malware counts declined during Q4, and were lower than in Q4 of 2010. Even so, the total number of unique malware samples is more than 75 million as of Q4, the report says.

“On a global basis, we are conducting more of our personal and business transactions through mobile devices, and this is creating new security risks and challenges in how we safeguard our commercial and personal data,” said Vincent Weafer, senior vice-president of McAfee Labs.

McAfee Labs recorded an average of 9,300 new bad websites per day in Q4, up from 6,500 in the previous quarter. The vast majority of new malicious sites were hosted in the US, followed by the Netherlands, Canada, South Korea and Germany.

McAfee noted that both SQL injection and cross-site scripting attacks were increasingly observed over the quarter, while corporate espionage and hacktivist attacks also look set to climb in 2012."We saw some advances in cybercrime toolkits, as well as events that may have involved national governments," the company said in its report.

The official website of the Los Angeles County Police Canine Association (http://www.lacpca.com) was hacked by CabinCr3w group of Hackers.

Hackers leak lots of data from the site on a Pastebin Note titled as "PedoCop & Police Emails". This data include officers names, addresses, and phone numbers of hundreds of officers and their membership rosters which were taken upon login.

Hacker also upload two Archives which have the complete Google Emails data of two officers. Hackers also Mention that "we will not be including the photos from the email in this release but we will be making contact with the appropriate organizations protecting children from exploitation online."